Browse > Article

A Use-case based Component Mining Approach for the Modernization of Legacy Systems  

Kim, Hyeon-Soo (충남대학교 전기정보통신공학부)
Chae, Heung-Seok (부산대학교 컴퓨터공학과)
Kim, Chul-Hong (한국전자통신연구원 소프트웨어공학연구팀)
Abstract
Due to not only proven stability and reliability but a significant investment and years of accumulated -experience and knowledge, legacy systems have supported the core business applications of a number of organizations over many years. While the emergence of Web-based e-business environments requires externalizing core business processes to the Web. This is a competitive advantage in the new economy. Consequently, organizations now need to mine the business value buried in the legacy systems for reuse in new e-business applications. In this paper we suggest a systematic approach to mining components that perform specific business services and that consist of the legacy system's assets to be leveraged on the modem platform. The proposed activities are divided into several tasks. First, use cases that realize the business processes are captured. Secondly, a design model is constructed for each identified use case in order to integrate the use cases with the similar functionalities. Thirdly, we identify component candidates from the design model and then adjust the component candidates by considering common elements among the candidate components. And also business components are divided into three more fine-grained components to deploy them onto J2EE/EJB environments. finally, we define the interfaces of components which provide functionalities of the components as operations.
Keywords
Legacy systems modernization; Component mining; Entenrise JavaBeans (EJB);
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 H. S. Kim and C. H. Kim, 'A use-case driven approach to component mining for legacy modernization,' Proc. of the IASTED Int'l Conf. on Software Engineering, pp.303-308, 2004
2 D. Alur, J. Crupi, and D. Malks, Core J2EE Patterns: Best Practices and Design Strategies, Prentice Hall PTR, 2001
3 M. A. Serrano, D. L. Carver, and C. M. Oca, 'Reengineering legacy systems for distributed environments,' The journal of Systems and Software, Vol. 64, No.1, pp.37-55, 2002   DOI   ScienceOn
4 송문섭, 박창순, '레거시 시스템 이해 도구를 이용한 비즈니스 로직 추출 기법', 한국정보과학회 제29회 추계학술발표회 논문집, 2002
5 한무희, 김현수, 김철홍, '레거시 시스템으로부터 컴포넌트를 추출하기 위한 방법', 한국정보과학회 소프트웨어공학회지, 제16권, 제1호, pp.91-102, 2003   과학기술학회마을
6 Micro Focus, 'Componentization of legacy assets: A rapid, low-risk method of creating reusable components from legacy CICS applications,' White Paper from Micro Focus, 2002
7 Intercomp, 'MineIT: Automated extraction of business rules from legacy COBOL applications to Java applications and objects,' White Paper from lntercomp, 2001
8 SEEC, 'A next-generation architecture for financial services on the internet,' White Paper from SEEC, 2000
9 Intercomp, 'WebIT: Web-Enabling of Legacy Applications,' White Paper from Intercomp, 200l
10 W. M. Ulrich, Legacy Systems: Transformation Strategies, Prentice Hall PTR, 2002
11 L. Erlikh, 'Leveraging legacy systems in modem architectures,' White Paper from Relativity Technologies, 2001
12 M. Battaglia, G. Savoia and J. Favaro, 'RENAISSANCE: A Method to Migrate from Legacy to Immortal Software Systems,' Proc. of CSMR'98, pp.l97-200, 1998   DOI